-
2
-
-
0346353138
-
STeP: The stanford temporal prover, user's manual
-
Computer Science Department, Stanford University
-
Bjørner, N., Browne, I., Chang, E., Colón, M., Kapur, A., Manna, Z., Sipma, H., Uribe, T.: STeP: The Stanford Temporal Prover, User's Manual. Technical Report STAN-CS-TR-95-1562, Computer Science Department, Stanford University (1995)
-
(1995)
Technical Report
, vol.STAN-CS-TR-95-1562
-
-
Bjørner, N.1
Browne, I.2
Chang, E.3
Colón, M.4
Kapur, A.5
Manna, Z.6
Sipma, H.7
Uribe, T.8
-
4
-
-
84903156915
-
Automatic deductive verification with invisible invariants
-
TACAS'01
-
Pnueli, A., Ruah, S., Zuck, L.: Automatic deductive verification with invisible invariants. In: TACAS'01, LNCS 2031 (2001) 82-97
-
(2001)
LNCS
, vol.2031
, pp. 82-97
-
-
Pnueli, A.1
Ruah, S.2
Zuck, L.3
-
5
-
-
36348969336
-
Parameterized verification with automatically computed inductive assertions
-
CAV'01
-
Arons, T., Pnueli, A., Ruah, S., Xu, J., Zuck, L.: Parameterized verification with automatically computed inductive assertions. In: CAV'01, LNCS 2102 (2001) 221-234
-
(2001)
LNCS
, vol.2102
, pp. 221-234
-
-
Arons, T.1
Pnueli, A.2
Ruah, S.3
Xu, J.4
Zuck, L.5
-
6
-
-
26444437197
-
IIV: An invisible invariant verifier
-
Balaban, I., Fang, Y., Pnueli, A., Zuck, L.: IIV: An invisible invariant verifier. In: Computer Aided Verification (CAV). (2005)
-
(2005)
Computer Aided Verification (CAV)
-
-
Balaban, I.1
Fang, Y.2
Pnueli, A.3
Zuck, L.4
-
7
-
-
3242706682
-
Model checking and abstraction to the aid of parameterized systems
-
Zuck, L., Pnueli, A.: Model checking and abstraction to the aid of parameterized systems. Computer Languages, Systems, and Structures 30(3-4) (2004) 139-169
-
(2004)
Computer Languages, Systems, and Structures
, vol.30
, Issue.3-4
, pp. 139-169
-
-
Zuck, L.1
Pnueli, A.2
-
8
-
-
84894634192
-
Parameterized verification of a cache coherence protocol safety and liveness
-
Baukus, K., Lakhnech, Y., Stahl, K.: Parameterized verification of a cache coherence protocol safety and liveness. In: Proceedings of the 6th International Conference on Verification, Model Checking, and Abstract Interpretation. (2002) 317-330
-
(2002)
Proceedings of the 6th International Conference on Verification, Model Checking, and Abstract Interpretation
, pp. 317-330
-
-
Baukus, K.1
Lakhnech, Y.2
Stahl, K.3
-
9
-
-
70350235720
-
Constructing quantified invariants via predicate abstraction
-
Lahiri, S., Bryant, R.: Constructing quantified invariants via predicate abstraction. In: Proceedings of the 5th International Conference on Verification, Model Checking, and Abstract Interpretation. (2004) 267-281
-
(2004)
Proceedings of the 5th International Conference on Verification, Model Checking, and Abstract Interpretation
, pp. 267-281
-
-
Lahiri, S.1
Bryant, R.2
-
10
-
-
0343738765
-
A timed verification of the IEEE 1394 leader election protocol
-
Gnesi, S., Latella, D., eds.
-
Romijn, J.M.T.: A timed verification of the IEEE 1394 leader election protocol. In Gnesi, S., Latella, D., eds.: Proceedings of the Fourth International ERCIM Workshop on Formal Methods for Industrial Critical Systems (FMICS'99). (1999) pages 3-29
-
(1999)
Proceedings of the Fourth International ERCIM Workshop on Formal Methods for Industrial Critical Systems (FMICS'99)
, pp. 3-29
-
-
Romijn, J.M.T.1
-
11
-
-
0003229324
-
Verification of a leader election protocol: Formal methods applied to IEEE 1394
-
Computing science Institute, Nijmegen
-
Devillers, M., Griffioen, W., Romijn, J., Vaandrager, F.: Verification of a leader election protocol: Formal methods applied to IEEE 1394. Technical Report CSI-R9728, Computing science Institute, Nijmegen (1997)
-
(1997)
Technical Report
, vol.CSI-R9728
-
-
Devillers, M.1
Griffioen, W.2
Romijn, J.3
Vaandrager, F.4
-
12
-
-
18944387681
-
Automatic verification of the IEEE 1394 root contention protocol with KRONOS and PRISM
-
Cleaveland, R., Garavel, H., eds. Volume 66.2 of Electronic Notes in Theoretical Computer Science., Elsevier
-
Daws, C., Kwiatkowska, M., Norman, G.: Automatic verification of the IEEE 1394 root contention protocol with KRONOS and PRISM. In Cleaveland, R., Garavel, H., eds.: Proc. 7th International Workshop on Formal Methods for Industrial Critical Systems (FMICS'02). Volume 66.2 of Electronic Notes in Theoretical Computer Science., Elsevier (2002)
-
(2002)
Proc. 7th International Workshop on Formal Methods for Industrial Critical Systems (FMICS'02)
-
-
Daws, C.1
Kwiatkowska, M.2
Norman, G.3
-
13
-
-
26944445043
-
Simulating reachability using first-order logic with applications to verification of linked data structures
-
Lev-Ami, T., Immerman, N., Reps, T.W., Sagiv, S., Srivastava, S., Yorsh, G.: Simulating reachability using first-order logic with applications to verification of linked data structures. In: CADE. (2005) 99-115
-
(2005)
CADE
, pp. 99-115
-
-
Lev-Ami, T.1
Immerman, N.2
Reps, T.W.3
Sagiv, S.4
Srivastava, S.5
Yorsh, G.6
-
14
-
-
0004215089
-
-
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA
-
Lynch, N.A.: Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (1996)
-
(1996)
Distributed Algorithms
-
-
Lynch, N.A.1
-
15
-
-
24144470812
-
Shape analysis by predicate abstraction
-
Balaban, I., Pnueli, A., Zuck, L.: Shape analysis by predicate abstraction. In: Proceedings of the 6th International Conference on Verification, Model Checking, and Abstract Interpretation. (2005) 164-180
-
(2005)
Proceedings of the 6th International Conference on Verification, Model Checking, and Abstract Interpretation
, pp. 164-180
-
-
Balaban, I.1
Pnueli, A.2
Zuck, L.3
-
16
-
-
84941163693
-
Invisible safety of distributed protocols
-
Computer Science Department, New York University
-
Balaban, I., Pnueli, A., Zuck, L.: Invisible safety of distributed protocols. Technical report, Computer Science Department, New York University (2006) http://www.cs.nyu.edu/acsys/pubs/permanent/dist-protocols-icalp06-full. pdf.
-
(2006)
Technical Report
-
-
Balaban, I.1
Pnueli, A.2
Zuck, L.3
-
17
-
-
0022807929
-
A simple parallel algorithm for the maximal independent set problem
-
Luby, M.: A simple parallel algorithm for the maximal independent set problem. SIAM Journal of Computing 15(4) (1986) 1036-1053
-
(1986)
SIAM Journal of Computing
, vol.15
, Issue.4
, pp. 1036-1053
-
-
Luby, M.1
|